Hybrid fuzzy integrated convolutional neural network (HFICNN) for similarity feature recognition problem in abnormal netflow detection

Abstract This paper presents a hybrid fuzzy integrated convolutional neural network (HFICNN) to deal with the similarity feature recognition problem in abnormal netflow detection, which is that different labels with the same netflow eigenvalues are not well disposed by traditional machine learning and deep learning methods. The HFICNN model can convert the same feature individuals with different labels to different feature individuals with different labels by constructing an integration method. Our method recognizes the actual environment and operational complexity, and converts the unique occurrence time feature performance as a new feature for feature recognition. HFICNN integrates time-dependent records into a new record to identify a feature, and converts the integrated records to the original label. The integration process plays a good role and effect in the entire process. HFICNN is realized with the aid of function mapping label redefinition (FMLR), adaptive feature integration convolutional neurons (AFICNs), fuzzy classification (FC), and inverse function mapping integrated reduction (IFMIR). The ICMPv6-based DDoS attacks dataset of a new-generation network is tested, and experimental results show that HFICNN performs better than 10 types of traditional machine learning and two types of deep learning methods on the similarity feature recognition problem, and the HFICNN model is reliable and effective.

[1]  Jisa David,et al.  Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic , 2019, Comput. Secur..

[2]  Jie Li,et al.  Discriminative dictionary pair learning based on differentiable support vector function for visual recognition , 2018, Neurocomputing.

[3]  Tinghuai Ma,et al.  Graph classification based on graph set reconstruction and graph kernel feature reduction , 2018, Neurocomputing.

[4]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[5]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[6]  Tanja Zseby,et al.  Fuzzy classification boundaries against adversarial network attacks , 2019, Fuzzy Sets Syst..

[7]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[8]  Minho Lee,et al.  Deep learning with support vector data description , 2015, Neurocomputing.

[9]  Kai Chen,et al.  A hybrid approach combining an extended BBO algorithm with an intuitionistic fuzzy entropy weight method for QoS-aware manufacturing service supply chain optimization , 2018, Neurocomputing.

[10]  Ezzeddine Zagrouba,et al.  Abnormal behavior recognition for intelligent video surveillance systems: A review , 2018, Expert Syst. Appl..

[11]  Sven Behnke,et al.  Object class segmentation of RGB-D video using recurrent convolutional neural networks , 2017, Neural Networks.

[12]  Laith Mohammad Abualigah,et al.  Hybrid clustering analysis using improved krill herd algorithm , 2018, Applied Intelligence.

[13]  Weisheng Chen,et al.  Distributed Cooperative Learning Over Networks via Fuzzy Logic Systems: Performance Analysis and Comparison , 2018, IEEE Transactions on Fuzzy Systems.

[14]  U. Raghavendra,et al.  Automated detection and classification of liver fibrosis stages using contourlet transform and nonlinear features , 2018, Comput. Methods Programs Biomed..

[15]  Mohammed Anbar,et al.  Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection , 2018, Arabian Journal for Science and Engineering.

[16]  Lin Wu,et al.  Crossing Generative Adversarial Networks for Cross-View Person Re-identification , 2018, Neurocomputing.

[17]  Witold Pedrycz,et al.  Fuzzy Wavelet Polynomial Neural Networks: Analysis and Design , 2017, IEEE Transactions on Fuzzy Systems.

[18]  Hau-San Wong,et al.  Adaptive activation functions in convolutional neural networks , 2018, Neurocomputing.

[19]  Alexander Binder,et al.  Evaluating the Visualization of What a Deep Neural Network Has Learned , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[20]  Ching-Chang Wong,et al.  Evolutional RBFNs image model describing-based segmentation system designs , 2018, Neurocomputing.

[21]  Mohammed Anbar,et al.  Labeled flow-based dataset of ICMPv6-based DDoS attacks , 2019, Neural Computing and Applications.

[22]  Guang-Hong Yang,et al.  Neural-network-based adaptive fault-tolerant tracking control of uncertain nonlinear time-delay systems under output constraints and infinite number of actuator faults , 2018, Neurocomputing.

[23]  Laith Mohammad Abualigah,et al.  Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering , 2018, Studies in Computational Intelligence.

[24]  Margaret Lech,et al.  Evaluating deep learning architectures for Speech Emotion Recognition , 2017, Neural Networks.

[25]  Gürsel Serpen,et al.  Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.

[26]  Mohammed Anbar,et al.  Intrusion Detection Systems of ICMPv6-based DDoS attacks , 2016, Neural Computing and Applications.

[27]  Ali A. Ghorbani,et al.  Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.

[28]  Cherukuri Aswani Kumar,et al.  Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..

[29]  Firas Najjar,et al.  Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).

[30]  Karim Afdel,et al.  Semi-supervised machine learning approach for DDoS detection , 2018, Applied Intelligence.

[31]  Mohammed Azmi Al-Betar,et al.  Unsupervised Text Feature Selection Technique Based on Particle Swarm Optimization Algorithm for Improving the Text Clustering , 2017 .

[32]  S. Shahrin,et al.  A Framework of IPv6 Network Attack Dataset Construction by Using Testbed Environment , 2014 .

[33]  Yan Li,et al.  Finite-time adaptive fuzzy output-feedback control of MIMO nonlinear systems with hysteresis , 2018, Neurocomputing.

[34]  Sung-Kwun Oh,et al.  Hybrid fuzzy polynomial neural networks with the aid of weighted fuzzy clustering method and fuzzy polynomial neurons , 2017, Applied Intelligence.

[35]  Sergio Salazar,et al.  Takagi–Sugeno Dynamic Neuro-Fuzzy Controller of Uncertain Nonlinear Systems , 2017, IEEE Transactions on Fuzzy Systems.

[36]  Yan Song,et al.  A deep learning framework for identifying children with ADHD using an EEG-based brain network , 2019, Neurocomputing.

[37]  S. Selvakumar,et al.  Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks , 2019, Neurocomputing.

[38]  Witold Pedrycz,et al.  Hybrid Fuzzy Wavelet Neural Networks Architecture Based on Polynomial Neural Networks and Fuzzy Set/Relation Inference-Based Wavelet Neurons , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[39]  Shengyong Chen,et al.  Moving object detection via segmentation and saliency constrained RPCA , 2019, Neurocomputing.

[40]  Elizabeth Chang,et al.  Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment , 2019, Future Gener. Comput. Syst..

[41]  Peng Wang,et al.  Appearance based pedestrians' head pose and body orientation estimation using deep learning , 2018, Neurocomputing.

[42]  Yang Yu,et al.  A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.

[43]  I. Chairez,et al.  Differential Neuro-Fuzzy Controller for Uncertain Nonlinear Systems , 2013, IEEE Transactions on Fuzzy Systems.

[44]  Oscar Castillo,et al.  Application of interval type-2 fuzzy neural networks in non-linear identification and time series prediction , 2013, Soft Computing.